19
February 11, 2003 NANOG 27, Phoenix Large-Scale Wireless Networks UT’s case Philippe Hanset The University of Tennessee [email protected]

Large-Scale Wireless Networks UT’s case

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Large-Scale Wireless Networks UT’s case

February 11, 2003 NANOG 27, Phoenix

Large-Scale Wireless NetworksUT’s case

Philippe HansetThe University of Tennessee

[email protected]

Page 2: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

The University of Tennessee~26K Students, ~4K faculty/staff at the Knoxville Campus, 15M assignable Sq Feet

Page 3: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

History of WLAN at UTK8 pilot projects by early Summer 2000(Lucent’s donation)…total success

President instructed a campus wide WLAN in one year, an a plan in 3 days(pilots and active ethernet required)

Started in January 2001, mostly accomplished by March 2002

Page 4: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Critical Design Factors

Power over Ethernet (802.3AF)Project unthinkable if AC had to be pulled for 1200 APs

802.11b with 802.11a in mind(25 dB at 2.4 GHz extrapolatesto 18 dB at 5 GHz)4 channels instead of 3

Page 5: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Aggressive DeploymentKnowledge of campus wiring comesfirst, wireless can be taughtSurvey the survey (maps before and after)Scripting 101 for ContractorsCentralize cat5 drops to save powerinjectorsCentrally deployed, with AUP(UT “owns” 2.4 and 5 GHz)Access is a key factor

Page 6: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

SurveysSubstantial variation in WLAN cardssensitivitySame antennas before and afterEmpty/Full buildingsInter-Building interferencesVertical usually better than HorizontalA dolly with a 12V battery and a power inverter

Page 7: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

A few Big VLANsConsidering the complexity and early stage of Mobile IP, UT decided to provide roaming to wireless users through the extensive usage of VLAN-trunks. A few huge flat networks. The main one has 920 APsWireless-VLANs prevents IP contention in local subnetsOn average, 40Kbps of broadcast traffic(no multicast nightmare…so far)

Page 8: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Private IPs for APsSaves 1200 IPs in UT’s caseSecurity by obscurityEasy to extract from ARP (home grown monitoring tool)Impersonate an AP gets you nowhere(web authentication gateways)Permits a practical IP numbering,quite useful to locate APs in huge VLANs

Page 9: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Numbering and NamingWSS13 is a wireless device in StudentServices, first floor, 3rd AP.WHTAG is a wireless device in Huge Tower10th floor, 16th AP (36 floors, 35 APs MAX)If DNS fails: AP is in VLAN1 connected to same switch as local wired subnet 160.36.24.0/24, its IP will be 10.1.24.xUnrelated but useful: color coded patch cables

Page 10: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

ManagementAPs are everywhere

Hide and Seek (sticker or not)Location Maps with accurate positioning(XP doesn’t reference AP-ID)Naming conventionActive Ethernet (remote control)

PERL/SNMP at the momentNew niche for management softwareCannot VLAN-trunk everywhere

Page 11: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Security trendsOriginal test was wide-openTried to enforce WEP with pilots:Unmanageable, no support for Appleat the time. WEP+ is fine for PTPMassive deployment used a fully authenticated and encrypted solution(1200 firmware changes in 5 days!)Semi-open at the moment with silentmonitoring based on DHCP registration

Page 12: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

No SecurityImportant Information Regarding WIRELESS SECURITY The new wireless network offers NO security features. Anything that you send across the wireless network will be visible to others. If you check your email on the wireless network using one of the typical email clients (Outlook, Outlook Express, Eudora, Netscape Mail, etc), your username, password, and email will all be visible to anyone in the general area. This does not mean that you cannot check your email on the wireless network. It only means that you must be careful how you do so. Here are some things you should do: 1. USE WEBMAIL -- https://webmail.utk.edu is a secure site, so you can securely check your email via Webmail.2. USE SSL -- When visiting websites that need to be encrypted (online banking, etc), make sure that you are connected to the site securely by checking for the glowing or locked padlock in your web browser. If you are connected to the site securely, then all of your communication with that website is encrypted.3. USE VPN -- A more complete solution is offered by using a Virtual Private Network client while connected to wireless. A Virtual Private Network (VPN) creates an encrypted tunnel through which you transmit data. Using a VPN connection, all of your traffic over wireless will be encrypted. More information about the above issues, including a link to the VPN client, is available

at http://wireless.utk.edu/security.

Page 13: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Home Grown solution

ARP tables of Wireless VLANSare collected every 5 minutesChecked against DHCP registrationdatabase, which resides on LDAPUn-identified MAC are filtered atthe switch, in CAM table.In 8 months, only 6 cases

Page 14: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Off-the-shelve Authentication UT explored off-the-shelve solutions,WEB basedIntegrates with most existing solutions(LDAP, RADIUS, SQL…)Provides “a la carte” services based onusers identity (can be contoured)as a faculty said “just beat the cheating curve”Visitors…show me the credentials, sponsors

Page 15: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Encryption

Convenience before SecurityWe had it, it failed…better be perfectbefore another essay (802.11i)Make it as ubiquitous as PPPOur worst nightmare: POP and IMAP(What about Ebay?) use VPN if your info is sensitive

Page 16: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Interesting Happenings

Rogues APs, where service is notavailable (eg: Dormitories)

How to detect rogues APs (MAC, driving)

Faculty wanting to stop servicesduring exams (jammers illegal in US)WISP without consentUnknown Boxes in ceilings

Page 17: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

Wireless Utilization (4000 registered users)

0

200

400

600

800

1000

1200

1400

1600

1800

2000

1-Jun-02

1-Jul-02

31-Jul-02

30-Aug-02

29-Sep-02

29-Oct-02

28-Nov-02

28-Dec-02

27-Jan-03

Time (Day)

Uni

que

MA

C a

ddre

sses

Page 18: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

b a g

b worksa is not practical, mostly becauseof antenna restrictionsg keeps comingEvery b joining the AP will slow downthe gees

Page 19: Large-Scale Wireless Networks UT’s case

NANOG 27, Phoenix

a and b ranges2.4 / 5.2 GHz Radio Coverage

20

30

40

50

60

70

80

90

100

10 20 30 40 50 60 70 80 90 100Cell Radius (m)

Dat

a R

ate

Ava

ilabi

lity

2.4 GHz, 1 Mbps2.4 GHz, 5.5 Mbps2.4 Ghz, 11 Mbps5.2 GHz, 6 Mbps5.2 Ghz, 24 Mbps5.2 GHz, 54 Mbps

Courtesy of :